remove operator token from Cloud ()

* remove operator token from Cloud

* Update create-token.md

* move oss-only tag

* Update content/influxdb/v2.0/reference/glossary.md

Co-authored-by: Scott Anderson <sanderson@users.noreply.github.com>

* Update content/influxdb/cloud/upgrade/v2-to-cloud.md

Co-authored-by: Scott Anderson <sanderson@users.noreply.github.com>

* add duplicate-oss shortcode to cloud glossary

* Update content/influxdb/v2.0/reference/glossary.md

Co-authored-by: Scott Anderson <sanderson@users.noreply.github.com>

* Update content/influxdb/v2.1/reference/glossary.md

Co-authored-by: Scott Anderson <sanderson@users.noreply.github.com>

* Update content/influxdb/v2.1/reference/glossary.md

Co-authored-by: Scott Anderson <sanderson@users.noreply.github.com>

* Update content/influxdb/v2.1/security/tokens/view-tokens.md

Co-authored-by: Scott Anderson <sanderson@users.noreply.github.com>

Co-authored-by: Scott Anderson <sanderson@users.noreply.github.com>
pull/3421/head^2
kelseiv 2021-11-18 14:28:46 -08:00 committed by GitHub
parent ddd1449551
commit c5e28ffb27
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
7 changed files with 52 additions and 18 deletions
content/influxdb
cloud/upgrade
v2.0
v2.1

View File

@ -79,7 +79,8 @@ Include the following flags for each configuration:
InfluxDB organization name.
The default organization name in InfluxDB Cloud is the email address associated with your account.
- **-\-token**: API token to use to connect to InfluxDB.
Provide an **All-Access** token (or an [Operator token](/{{< latest "influxdb" >}}/security/tokens/#operator-token) for 2.x).
- **InfluxDB Cloud**: Provide an **All-Access** token.
- **InfluxDB OSS 2.x**: Provide an [Operator token](/{{< latest "influxdb" >}}/security/tokens/#operator-token).
##### Create an InfluxDB Cloud connection configuration
```sh

View File

@ -1092,13 +1092,22 @@ Related entries: [point](#point), [unix timestamp](#unix-timestamp), [RFC3339 ti
### token
Tokens (or API tokens) verify user and organization permissions in InfluxDB.
There are different types of athentication tokens:
There are different types of API tokens:
- **Operator token:** grants full read and write access to all resources in **all organizations in InfluxDB OSS 2.x**.
_InfluxDB Cloud does not support Operator tokens._
{{% oss-only %}}
- **Operator token:** grants full read and write access to all resources in **all organizations in InfluxDB OSS 2.x**. _InfluxDB Cloud does not support Operator tokens._
- **All-Access token:** grants full read and write access to all resources in an organization.
- **Read/Write token:** grants read or write access to specific resources in an organization.
{{% /oss-only %}}
{{% cloud-only %}}
- **All-Access token:** grants full read and write access to all resources in an organization.
- **Read/Write token:** grants read or write access to specific resources in an organization.
{{% /cloud-only %}}
Related entries: [Create a token](/influxdb/v2.0/security/tokens/create-token/).
### tracing

View File

@ -56,6 +56,8 @@ influx auth create \
--all-access
```
{{% oss-only %}}
#### Create an Operator token
Create an Operator token to grant permissions to all resources in all organizations.
@ -65,6 +67,7 @@ influx auth create \
--org my-org \
--operator
```
{{% /oss-only %}}
#### Create a token with specified read permissions

View File

@ -71,7 +71,11 @@ To filter tokens by user, include `userID` as a query parameter in your request.
{{% get-shared-text "api/v2.0/auth/oss/tokens-view-filter.sh" %}}
```
{{% oss-only %}}
[***Operator tokens***](/{{% latest "influxdb" %}}/security/tokens/#operator-token) have access to all organizations' authorizations.
To filter authorizations by organization when using an operator token, include an `org` or `orgID` query parameter in your request.
{{% oss-only %}}
See the [`/authorizations` endpoint documentation](/influxdb/v2.0/api/#tag/Authorizations) for more information about available parameters.

View File

@ -1092,13 +1092,22 @@ Related entries: [point](#point), [unix timestamp](#unix-timestamp), [RFC3339 ti
### token
Tokens (or API tokens) verify user and organization permissions in InfluxDB.
There are different types of athentication tokens:
There are different types of API tokens:
- **Operator token:** grants full read and write access to all resources in **all organizations in InfluxDB OSS 2.x**.
_InfluxDB Cloud does not support Operator tokens._
{{% oss-only %}}
- **Operator token:** grants full read and write access to all resources in **all organizations in InfluxDB OSS 2.x**. _InfluxDB Cloud does not support Operator tokens._
- **All-Access token:** grants full read and write access to all resources in an organization.
- **Read/Write token:** grants read or write access to specific resources in an organization.
{{% /oss-only %}}
{{% cloud-only %}}
- **All-Access token:** grants full read and write access to all resources in an organization.
- **Read/Write token:** grants read or write access to specific resources in an organization.
{{% /cloud-only %}}
Related entries: [Create a token](/influxdb/v2.1/security/tokens/create-token/).
### tracing

View File

@ -58,6 +58,8 @@ influx auth create \
--all-access
```
{{% oss-only %}}
#### Create an Operator token
Create an Operator token to grant permissions to all resources in all organizations.
@ -68,6 +70,8 @@ influx auth create \
--operator
```
{{% /oss-only %}}
#### Create a token with specified read permissions
```sh

View File

@ -71,7 +71,11 @@ To filter tokens by user, include `userID` as a query parameter in your request.
{{% get-shared-text "api/v2.0/auth/oss/tokens-view-filter.sh" %}}
```
{{% oss-only %}}
[***Operator tokens***](/{{% latest "influxdb" %}}/security/tokens/#operator-token) have access to all organizations' authorizations.
To filter authorizations by organization when using an operator token, include an `org` or `orgID` query parameter in your request.
{{% oss-only %}}
See the [`/authorizations` endpoint documentation](/influxdb/v2.1/api/#tag/Authorizations) for more information about available parameters.